General

  • Target

    2024-02-12_a589e51d5c3293416e27c4fd767f24ea_cryptolocker

  • Size

    62KB

  • MD5

    a589e51d5c3293416e27c4fd767f24ea

  • SHA1

    01bf8106bcbdef486c2951d5c44f20441af6d2e2

  • SHA256

    8e91eefdbe7945c575e07d2daf95aed0824b896b63c0a6ab8dde0dfc90c348ea

  • SHA512

    c507870d65158f9686ed4417b2600629d6e13c8dd045d0ed2e78e7bd8370c1e0a7005e7ad8be8a838eacfb5c04cb4e13b24b22fd299cb0f6bb8ffd4c52c32b07

  • SSDEEP

    1536:P8mnK6QFElP6n+gymddpMOtEvwDpjYibAod:1nK6a+qdOOtEvwDpjj

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-02-12_a589e51d5c3293416e27c4fd767f24ea_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections